UNIX Systems have been instrumental in the information systems management of corporations and organizations for many years. Although in recent years it has been overshadowed by other operating systems, it still remains as an alternative to other systems. The purpose of this discussion is to describe the benefits and problems associated with UNIX systems.
The most beneficial aspects of UNIX are the robust nature of the system and the ability to secure the system effectively. The robust nature of the system allows organizations to manage various technological functions properly with speed and ease. The ability to secure the system allows organizations to tightly control who can access the system.
Two of the most problematic aspects of UNIX have been the differences in the versions of UNIX that were offered by various vendors and the fact that the system has not been as user friendly as other alternatives. The differences in the versions of UNIX were problematic because they required application software to be rewritten many times (Moody 2001). In addition, it locked organizations into using the products of only one vendor (Moody 2001). The literature also points out that may organizations choose not to use UNIX because it is not as user friendly as that PC (Courtney and Hunton 1993).
Research Question
The purpose of this research is to review the history of the Unix System and the problems associated with the use of the system in today's technological world. The discussion will seek to determine the reasons for the problems that are associated with UNIX. The discussion will also focus on the UNIX predecessor, LINUX.
Literature Studied
According to an article found in the CPA Journal the UNIX, system was created in 1970 by Dennis Ritchie and Ken Thompson (Gladek et al., 1989). Both men worked for Bell laboratories and the product was introduced to the public in 1974. Initially, the product was given to universities and scientific organization for free or at a discounted cost (Gladek et al., 1989). According to the authors, this led to the further development of the system (Gladek et al., 1989). The authors also explain that in 1980 there were nearly 2500 UNIX installations around the world (Gladek et al., 1989). By 1984 that number had increased to 100,000 and by 1988 the number of UNIX installations was 700,000 (Gladek et al., 1989).
The authors assert that UNIX "is a multi-user, multi-tasking operating system. A computer installation running UNIX consists typically of a single computer, one or more printers, possibly one or more modems, and a number of terminals (Gladek et al., 1989)." The authors also maintain that the UNIX system is/was not considered as user friendly as the Personal Computer. According to Courtney and Hunton (1993) "After the introduction of more powerful PCs, a compact version of Unix, called XENIX, was marketed to support multiple users on PCs. XENIX performed quite adequately but generally was shunned because it was difficult to use. After all, it was designed by and for engineers and scientists; user-friendliness was not a design consideration (Courtney and Hunton 1993)."
The UNIX system was unique in that it allowed a high-speed processor to alternate quickly between various tasks, which give each user the feeling that he or she commands the system's full concentration (Gladek et al., 1989). The authors assert that the functions of the UNIX system include the allocation of processor time and memory fairly between "simultaneous" processes; manage the use of devices like modems and printers so they can be shared fairly between users; and "giving users access to only those files they are authorized to use (Gladek et al., 1989). Moody 2001 explains, "The UNIX philosophy is really very easy," Salus says, "and consists of maybe two or three notions. The first one, which is perhaps the most innovative thing that Thompson ever thought of, is that everything is a file. Second is the notion that when you build something, no matter whether it's an editor or whether it's a way of attaching one file to another file, you write things that are for a single purpose but do that purpose well (Moody 2001)."
In time, UNIX became known as a product for hackers because it lacked the proper security. A white paper published by the UNIX Systems Cooperative Promotion Group, explains that UNIX was the first operating system to be compromised through internet attacks ("The UNIX Operating System:
Mature, Standardized and State-of-the-Art," n.d.). In addition, the system was never a corporate product (Moody 2001). Instead, UNIX had many different vendors that offered slightly different versions from one another (Moody 2001). The differences in the versions were problematic because "application software had to be rewritten many times,...
This allows for greater levels of planning and cooperation, and fills in the information gap that currently exists between the factory floor and the rest of the supply chain. Lexmark provides an example of waste. Recently, the company found itself with more than $1 million in scrap from one lot. Engineers had insufficient information to isolate and fix the problem, so were instead relegated to crisis control. With more accurate
SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now